39672926-cryptosoft

Upload: jasvinder-anand

Post on 08-Apr-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 39672926-CRYPTOSOFT

    1/35

  • 8/7/2019 39672926-CRYPTOSOFT

    2/35

    CONTENTS Problem Definition

    Problem Description

    Software requirements

    Data protection software

    Use case diagram

    Data Flow Diagram

    Applications

    Conclusion

  • 8/7/2019 39672926-CRYPTOSOFT

    3/35

    PROBLEM DEFINITION

    Main aim

    Develop a cryptosystem for ensuring data security

    Used to encrypt or decrypt files , folders or even the drives of a computer

    system

    Scope of the project is not only to meet the needs of an organisation but also

    on individual needs

    The proposed system achieves the following goals:

    Confidentiality: To protect a user's identity or data from being read.

    Data integrity: To protect data from being altered.

    Authentication: To assure that data ori inates from a articular art .

  • 8/7/2019 39672926-CRYPTOSOFT

    4/35

    PROBLEM DESCRIPTION

    Based on cryptography

    Implementing cryptographic techniques such as encryption and

    description

    Two types of cryptographic schemes

    1.Secret key (or symmetric) cryptography

    2. Public-key (or asymmetric) cryptography.

    Algorithms used are DES,Triple DES,Rijandael algorithms for

    message encryption & decryption and RSA for key encryption and

    decryption

  • 8/7/2019 39672926-CRYPTOSOFT

    5/35

  • 8/7/2019 39672926-CRYPTOSOFT

    6/35

    WHY CRYPTOSOFT??? Software customizationfacility

    Drive Encryptionfacility

    Accu

    rateoutputis

    provided Excellentperformanceforensuringdata security

    Helpfultomaintain confidentialdatabases

    Simple userinterfaces

    Easyimplementation

    Low cost hardwarerequirements Userfriendly

    Noneedforanymaintanence.

  • 8/7/2019 39672926-CRYPTOSOFT

    7/35

    WHAT IS

    CRYPTOGRAPHY??? Cryptography : from the Greek for secret writing

    It is the mathematical scrambling of data so that

    only someone with the necessary key can unscramble

    it.

    Secure transmission of private information

    Secure storage of sensitive data

  • 8/7/2019 39672926-CRYPTOSOFT

    8/35

    DATA FLOW DIAGRAMS

    Level 0 DFD

    Crypto

    system

    PLAIN TEXT CIPHER TEXT

    OutputInput

  • 8/7/2019 39672926-CRYPTOSOFT

    9/35

    ENCRYPTION-

    TERMINOLOGY

  • 8/7/2019 39672926-CRYPTOSOFT

    10/35

    SYMMETRIC ENCRYPTION &

    DECRYPTION

    Same algorithm with

    same key is used for

    encryption &decryption.

    Sender & the receiver

    must share the

    algorithm and the key.

    The key must be kept

    secret.

  • 8/7/2019 39672926-CRYPTOSOFT

    11/35

    ASYMMETRIC ENCRYPTION AND

    DECRYPTION

    Sending keys securely

    1 algorithm -

    encryption &

    decryption + a pair

    of keys

    One of the two keys

    must be kept secret.

  • 8/7/2019 39672926-CRYPTOSOFT

    12/35

    COMBINING SYMMETRIC &

    ASYMMETRIC ENCRYPTION

    Each user should have a pair

    of keys (public, private).

    Sender encrypt the plaintext

    using the receivers public key

    and send it to the receiver.

    Receiver can decrypt thecipher text with his private

    key.

  • 8/7/2019 39672926-CRYPTOSOFT

    13/35

    The proposed software performs the following tasks.

    Software Customization

    Symmetric Encryption & Decryption

    Asymmetric Encryption & Decryption

    DATA PROTECTION

    SOFTWARE

  • 8/7/2019 39672926-CRYPTOSOFT

    14/35

    Level 1 DFD

    ( Data Protection Software )

    Asymmetric

    Decryption

    User

    Asymmetric

    Encryption

    Symmetric

    Decryption

    Symmetric

    Encryption

    Software

    Customizatio

    n

    CODE NO

  • 8/7/2019 39672926-CRYPTOSOFT

    15/35

    SOFTWARE

    CUSTOMIZATION Input a secret code number.

    Software performs mathematical calculations and the

    result is used to select one of the embeddedcryptographic schemes.

    User should use the same customization code for

    both encryption & decryption of a document. The sender while sending a cipher text, should

    communicate customization code to the receiver.

  • 8/7/2019 39672926-CRYPTOSOFT

    16/35

    Level 1.1 DFD

    ( Software Customization Module )

    User

    DES

    Algorithm

    Triple

    DES

    Algorithm

    Rijndael

    Algorithm

    RESULT

    SELECTION

    FLAG

    Algorith

    m

    Selection

    Arithmetic

    operations

    CODE NO

  • 8/7/2019 39672926-CRYPTOSOFT

    17/35

    SYMMETRIC ENCRYPTION

    & DECRYPTION The plaintext & the secret key are fed to the algorithm.

    The plaintext is divided into blocks of bits.

    Each block is again divided and combined with a sub

    key and will undergo permutation & substitution

    operations to produce the cipher text

    The proposed software uses DES , TripleDES &Rijandael algorithms for both encryption & decryption.

  • 8/7/2019 39672926-CRYPTOSOFT

    18/35

  • 8/7/2019 39672926-CRYPTOSOFT

    19/35

    CALCULATION OF F(R,K)

  • 8/7/2019 39672926-CRYPTOSOFT

    20/35

    S box substitution

  • 8/7/2019 39672926-CRYPTOSOFT

    21/35

    DES,TRIPLE DES AND

    RIJANDAEL PARAMETERS

  • 8/7/2019 39672926-CRYPTOSOFT

    22/35

    Level 1.2 DFD

    ( Symmetric Encryption Module )

    User

    File

    Folder

    Drive

    DES

    Encryption

    Algorithm

    Triple DES

    Encryption

    Algorithm

    PLAIN TEXT

    SYMMETRIC

    KEY

    PLAIN TEXT CIPHER TEXT

    Rijandael

    Encryption

    Algorithm

    Encrypteddocuments

  • 8/7/2019 39672926-CRYPTOSOFT

    23/35

    Level 1.3 DFD

    ( Symmetric Decryption Module )

    User

    File

    Folder

    Drive

    DES

    Decryption

    Algorithm

    Triple DES

    Decryption

    Algorithm

    Rijandael

    Decryption

    Algorithm

    CIPHER TEXT

    SYMMETRIC

    KEY

    CIPHER TEXT PLAIN TEXTDecrypteddocuments

  • 8/7/2019 39672926-CRYPTOSOFT

    24/35

    ENCRYPTION AND

    DECRYPTION This feature is added for transferring the

    symmetric key & customization code securely.

    The proposed software uses RSA algorithm forencryption & decryption.

    RSA algorithm is based on mathematical

    techniques rather than on substitution &permutation.

  • 8/7/2019 39672926-CRYPTOSOFT

    25/35

    Level 1.4 DFD

    (A

    symmetric Encryption Module )

    UserRSA Encryption

    AlgorithmEncrypted keys

    CIPHER TEXT

    PUBLICKEY OFCLIENT

    SYMMETRICKEY

    & CODE NO

  • 8/7/2019 39672926-CRYPTOSOFT

    26/35

    Level 1.5 DFD

    (A

    symmetric Decryption Module )

    User RSA

    Decryption

    Algorithm

    Decrypted keys

    SYMMETRICKEY& CODE NO

    CIPHER TEXT

    PRIVATE KEY OFCLIENT

  • 8/7/2019 39672926-CRYPTOSOFT

    27/35

    USE CASE DIAGRAMS

  • 8/7/2019 39672926-CRYPTOSOFT

    28/35

    Obtain a number

    Repeat the entry

    Press the customizebutton

    SOFTWARE CUSTOMIZATION

  • 8/7/2019 39672926-CRYPTOSOFT

    29/35

  • 8/7/2019 39672926-CRYPTOSOFT

    30/35

    Obtain sourcedrive

    Obtain destinationdrive

    Obtain Password

    Press the Encryptbutton

    Obtain source file

    Obtain destinationfile

    Obtain Password

    Press the decryptbutton

    DRIVE ENCRYPTION &

    FILE DECRYPTION

  • 8/7/2019 39672926-CRYPTOSOFT

    31/35

    Obtain source

    drive

    Obtain destination

    drive

    Obtain Password

    Press the decryptbutton

    Obtain sourcefolder

    Obtain destinationfolder

    Obtain Password

    Press the decryptbutton

    DRIVE & FOLDER

    DECRYPTION

  • 8/7/2019 39672926-CRYPTOSOFT

    32/35

    Obtain publickey

    Obtain private

    key

    Press generate keybutton

    Enter the key

    Enter thecode

    EnterPassword

    Obtain thedestination

    folder

    Press the encrypt

    button

    KEY SETTINGS & KEY

    ENCRYPTION

  • 8/7/2019 39672926-CRYPTOSOFT

    33/35

    Obtain the sourcefile

    Obtain thedestination file

    EnterPassword

    Press the Decryptbutton

    KEY DECRYPTION

  • 8/7/2019 39672926-CRYPTOSOFT

    34/35

    CONCLUSION The primary objective of this system is to protect

    confidential documents

    Cryptography helps to store confidential data of any size DES, Triple DES and Rijndael algorithms are fast and are

    well suited for performing cryptographic transformations

    on large streams of data.

    The implementation and the design will be presented in the

    later phases

  • 8/7/2019 39672926-CRYPTOSOFT

    35/35

    Thank you!!!